Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-10-2024 00:14
Static task
static1
Behavioral task
behavioral1
Sample
4ac846154d1f91c30a373dc364d880d7f36b0d1f23edbf8e854b38b804db7549.dll
Resource
win7-20240903-en
General
-
Target
4ac846154d1f91c30a373dc364d880d7f36b0d1f23edbf8e854b38b804db7549.dll
-
Size
700KB
-
MD5
bfbcb9e4b4723629dda33d1406a87d3a
-
SHA1
d342007297faf30e3cd1a703b31287e735470858
-
SHA256
4ac846154d1f91c30a373dc364d880d7f36b0d1f23edbf8e854b38b804db7549
-
SHA512
d0679c2dead14ccc998bf6ae31c79e3e4570a345401374a099e2feb3252eb1a2a2159b559a0963523f39e4080d6ecf672d2c397c12cdce7d1a142c7eb81afd41
-
SSDEEP
12288:dEwgKnIhABTW0HcD5a1PKxdZhC+k+V9Hgeb/tf/B9P632vHAA:dEwXnOAx5HcDM1Sxd3ChCHg2/P9yGo
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1200-4-0x0000000002EA0000-0x0000000002EA1000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/2128-0-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/1200-24-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/1200-37-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/1200-36-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/2128-44-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/2872-54-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload behavioral1/memory/2872-58-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload behavioral1/memory/2164-74-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload behavioral1/memory/1988-90-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
rekeywiz.exespreview.exeDisplaySwitch.exepid process 2872 rekeywiz.exe 2164 spreview.exe 1988 DisplaySwitch.exe -
Loads dropped DLL 7 IoCs
Processes:
rekeywiz.exespreview.exeDisplaySwitch.exepid process 1200 2872 rekeywiz.exe 1200 2164 spreview.exe 1200 1988 DisplaySwitch.exe 1200 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gazvzzjnt = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\00xX\\spreview.exe" -
Processes:
rundll32.exerekeywiz.exespreview.exeDisplaySwitch.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rekeywiz.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spreview.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DisplaySwitch.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2128 rundll32.exe 2128 rundll32.exe 2128 rundll32.exe 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 1200 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1200 wrote to memory of 2868 1200 rekeywiz.exe PID 1200 wrote to memory of 2868 1200 rekeywiz.exe PID 1200 wrote to memory of 2868 1200 rekeywiz.exe PID 1200 wrote to memory of 2872 1200 rekeywiz.exe PID 1200 wrote to memory of 2872 1200 rekeywiz.exe PID 1200 wrote to memory of 2872 1200 rekeywiz.exe PID 1200 wrote to memory of 2532 1200 spreview.exe PID 1200 wrote to memory of 2532 1200 spreview.exe PID 1200 wrote to memory of 2532 1200 spreview.exe PID 1200 wrote to memory of 2164 1200 spreview.exe PID 1200 wrote to memory of 2164 1200 spreview.exe PID 1200 wrote to memory of 2164 1200 spreview.exe PID 1200 wrote to memory of 1816 1200 DisplaySwitch.exe PID 1200 wrote to memory of 1816 1200 DisplaySwitch.exe PID 1200 wrote to memory of 1816 1200 DisplaySwitch.exe PID 1200 wrote to memory of 1988 1200 DisplaySwitch.exe PID 1200 wrote to memory of 1988 1200 DisplaySwitch.exe PID 1200 wrote to memory of 1988 1200 DisplaySwitch.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4ac846154d1f91c30a373dc364d880d7f36b0d1f23edbf8e854b38b804db7549.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2128
-
C:\Windows\system32\rekeywiz.exeC:\Windows\system32\rekeywiz.exe1⤵PID:2868
-
C:\Users\Admin\AppData\Local\HE6\rekeywiz.exeC:\Users\Admin\AppData\Local\HE6\rekeywiz.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2872
-
C:\Windows\system32\spreview.exeC:\Windows\system32\spreview.exe1⤵PID:2532
-
C:\Users\Admin\AppData\Local\wZVGb\spreview.exeC:\Users\Admin\AppData\Local\wZVGb\spreview.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2164
-
C:\Windows\system32\DisplaySwitch.exeC:\Windows\system32\DisplaySwitch.exe1⤵PID:1816
-
C:\Users\Admin\AppData\Local\83Tx\DisplaySwitch.exeC:\Users\Admin\AppData\Local\83Tx\DisplaySwitch.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1988
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
704KB
MD548539273dc345606c1fa69ee468e0d3f
SHA120f36a167f6be2d6d1bb0d99ef57f2d1f119ef19
SHA256e2a8e23f63c1e3ff859353a7ed6f77c45efe100d57f21158235d50d4afbbe31c
SHA51203eb194aa9076708c7907572c0cab77e174838dd7e6d531d6b0925dbd7f95e034b0871fafa8b81f8225b3059c9a4eac1264abbac4f2f390aa80512566d24e687
-
Filesize
704KB
MD55a7b5be4a67239eb1e5432561d22fb18
SHA127f75fc3a58f3901f0a3c5b5a3abf810d93b6d64
SHA256e768cb174fe878a5de69c93cae742b9ba5a3fee6a2ef49df89111504812b70d1
SHA5120850d0e58dae25a93a7609a4476eb81d5d2b34e58d058df844d89c4740b6f9f660f0b70252eacb50c950d6abad5d85aac822d59d66fdcbb9a0a9aae3ef61b8ec
-
Filesize
704KB
MD5c2a45924fe44863992d7a3a62a4f5943
SHA1640d7404a8d3ba60f895d438f2e6a0b26b30addb
SHA256e22a6e370adc5eb209e5f361a5da29d4e8eaccf87dc7550586284bf84f113e09
SHA512bb74c78f4b22b14f18afea51a4937ffaed102bb5fbdb867aebb326bca46d0d58616bc3ae03a7b75e85c579b053dd72ea8315f05b59a0eab72eb77f4e948adda2
-
Filesize
1KB
MD5d47efb26d0d86b4fdfd72ff4f7b145bb
SHA124515a8bd089876aa80f34d4ade6ae4fd3fee0b2
SHA2566642a0b41dcac0550d6aedd14aa6a972af19c4bfecc52c809635da9dc9967f82
SHA512c65513e723936b8424bb568d646fe72f24f084192dc4e2e4d07c28a13f0ed8334679a1bff8940b0fcc3174252b265f5c26db8464f409f21e19adffb34241c5e8
-
Filesize
517KB
MD5b795e6138e29a37508285fc31e92bd78
SHA1d0fe0c38c7c61adbb77e58d48b96cd4bf98ecd4a
SHA25601a9733871baa8518092bade3fce62dcca14cdf6fc55b98218253580b38d7659
SHA5128312174a77bab5fef7c4e9efff66c43d3515b02f5766ed1d3b9bd0abb3d7344a9a22cbac228132098428c122293d2b1898b3a2d75f5e4247b1dcb9aa9c7913b1
-
Filesize
67KB
MD5767c75767b00ccfd41a547bb7b2adfff
SHA191890853a5476def402910e6507417d400c0d3cb
SHA256bd70e504871a2ac1c883d19b87970c8d1b8b251c784bf777ba77ed764f5f2395
SHA512f096043452a1aa213a5e4d62638de3ee4b0b3ad3d12b7ee0372d8c79e00e2e13b4fd0ebc4206bbdb5124bed292dd5b30ef1641288046ef835f89c332985154f9
-
Filesize
294KB
MD5704cd4cac010e8e6d8de9b778ed17773
SHA181856abf70640f102b8b3defe2cf65669fe8e165
SHA2564307f21d3ec3b51cba6a905a80045314ffccb4c60c11d99a3d77cc8103014208
SHA512b380264276bad01d619a5f1f112791d6bf73dc52cdd5cca0cc1f726a6f66eefc5a78a37646792987c508f9cb5049f0eb86c71fb4c7a2d3e670c0c8623f0522ee